emptymonkey / xorscura
A tool / library for simplifying string obfuscation with xor.
☆23Updated 8 months ago
Alternatives and similar repositories for xorscura:
Users that are interested in xorscura are comparing it to the libraries listed below
- runtime code injector for Linux☆27Updated 13 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆21Updated 5 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- ☆13Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- An encryptor/compressor for PE executables☆20Updated last year
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- ☆17Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- IMEI generator used in Huawei modified firmware☆12Updated 2 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 11 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- File antivirus☆10Updated 5 years ago
- ELF binary infector☆32Updated 13 years ago
- ELF packer for i386☆32Updated 9 years ago